We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 1
Building Security Plan
Lines of Business: Property, General Liability
Risk Control Strategy/Key Issues: Establish an access control plan to limit unauthorized
building entry
Suggested Program Elements:
7
2
Policy Statement:
+ Include a statement of management's commitment to controlling building access in the policies
and precedures, and/or erisis management plan
+ Delegate authority far implementation of the plan and state that necessary resources will be
rovided to ensure its success
+ Assign responsibility and accountability for the plan to persons who will responsible for
compliance with plan elements
Building Access Controls:
+ Evaluate current facility design, use and limitations to determine specific access needs and
requirements during regular hours of operation and after-hours usage
+ Minimize the number of entrances without compromising emergency egress. This can be
accomplished by using door harchware that only apens from the inside.
Magnetic locks can help te ensure doors fully close and latch after entry or egress is made.
Create a visitor Sign-in, Sign-out, and escort procedure
Use visitor ID badges
Post signs on exit doors that state visitor sign-in requirements and warm that violators could be
charged with trespassing
+ Secure custodial and delivery doors and keep records of deliveries that include the following:
¥ Vendor name
¥ Name of delivery person
¥ License plate al vehicle
Date and time of arrival and departure
‘+ Restrict after-hours access by groups to limited areas and entry points where unfettered access
to the building is not possible
Provide a sta member or security guard at group tunctions during after hour use
Keep all doors lacked and secured during aternours activities
Limit Key tistrbution and, if possible, use electanic card Key access to monitor entry
Require the use of photo ID badges by staff, and students where applicable
Pravide security cameras at access points when possible
Use security resources that have a visible presence, such as a deputy, potice officer, or schoot
resource officer